Hackers Leak i2VPN Admin Credentials on Telegram | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

With over 500,000 downloads from the Google Play Store alone, i2VPN boasts a significant user base.

In a recent cybersecurity incident, hackers have claimed to have successfully breached the admin credentials of i2VPN, a popular freemium VPN proxy server app available for download on Google Play and the App Store.

The hackers allegedly gained access to i2VPN’s main admin dashboard, obtaining confidential information related to hundreds of thousands of users. The breach came to light when the cybersecurity team at SafetyDetectives discovered that hackers had posted what appeared to be sensitive information from i2VPN on Telegram.

According to details shared by SafetyDetective with, the leaked data included the admin’s email address and password, as well as screenshots of the dashboard displaying data centers and users’ subscription details.

Alleged leaked credentials on Telegram and what the alleged i2VPN dashboard looks like (Screenshot credit: SafetyDetective)

Although the hackers did not directly release user data, the compromised admin panel credentials potentially grant access to a substantial amount of personal information and data centers.

This should not come as a surprise, since VPN companies are always a preferred target for hackers, and any security flaw can lead to privacy breaches of unsuspecting users. Just a few days ago, exclusively reported how SuperVPN, a free VPN service provider, exposed 360 million user records to the public.

With over 500,000 downloads from the Google Play Store alone, i2VPN boasts a significant user base. While the exact number of downloads from the App Store remains undisclosed, it is reasonable to assume that the alleged breach could impact a considerable number of individuals.

If the claims are true, the leaked information could expose sensitive details, including user IDs, account names, registered email addresses, and subscription-related information such as payment methods and expiry dates.

The implications of this breach are far-reaching. Hackers with access to such data could exploit it for various malicious purposes, including spying on users’ activities and perpetrating fraudulent activities.

Additionally, cybercriminals might employ compromised account information to initiate phishing attacks, leveraging the obtained names and email addresses to impersonate individuals and trick them into divulging sensitive personal information.

If you are an i2VPN user or subscriber, it is crucial to take immediate steps to bolster your security, particularly if you have noticed any suspicious activity related to your account. Consider the following precautions:

  • Evaluate whether you want to continue using i2VPN in light of these reported concerns.
  • Review the accounts, platforms, and websites you accessed while connected to the VPN service. Take measures to safeguard these accounts by changing your login credentials.
  • Scan your devices for any sensitive files or communications. Transfer or remove them promptly to prevent further compromise.

As the investigation into this breach continues, i2VPN must take swift action to address the security vulnerabilities and reinforce its system to prevent similar incidents in the future. Users are advised to remain vigilant and stay updated on any official announcements or notifications from i2VPN regarding the breach and recommended security measures.

In an increasingly interconnected world, incidents like these serve as reminders of the importance of robust cybersecurity practices and the need to exercise caution when sharing personal information online.

  1. Kiwi Farms Website Hacked! Admin Warns of Data Leak
  2. Hacker dumps database with users, admin data
  3. Hackers dump login data of Fortinet VPN users in plain-text
  4. 15b credentials from 100,000 data breaches sold on dark web
  5. Hackers Selling US Colleges VPN Credentials on Russian Forums


Click Here For The Original Story From This Source.

National Cyber Security